Fake Messaging Apps Used to Deliver ProSpy Spyware
Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications. The operation delivers an Android spyware known as ProSpy, aimed primarily at [...]
Adobe Reader Zero-Day Targets Users
Security researchers from EXPMON have uncovered a critical zero-day vulnerability in Adobe Reader that is actively being exploited in targeted attacks. The flaw enables attackers to steal sensitive data and [...]
Malicious npm Package Impersonates Gemini to Steal AI Tokens
Attackers are actively targeting developers by distributing a malicious npm package disguised as a tool for validating AI tokens. The package pretends to be مرتبط with Google Gemini but is [...]
CUPS Vulnerabilities: Remote Code Execution and Root Access Risk
The widely used CUPS printing system has been found to contain critical vulnerabilities that could allow attackers to execute code and potentially gain full control over affected systems. Since the [...]
LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed
A recent investigation by Fairlinked e.V. has raised significant concerns regarding potential undisclosed data collection practices by LinkedIn. The report, referred to as “BrowserGate,” alleges that the platform deploys hidden [...]